A new approach to the maximum-flow problem
Journal of the ACM (JACM)
Improved time bounds for the maximum flow problem
SIAM Journal on Computing
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
A faster deterministic maximum flow algorithm
SODA '92 Proceedings of the third annual ACM-SIAM symposium on Discrete algorithms
Internet Privacy Enhanced Mail
Communications of the ACM - Special issue on internetworking
Trust-based navigation in distributed systems
Computing Systems
Protect your privacy: a guide for PGP users
Protect your privacy: a guide for PGP users
Endorsements, licensing, and insurance for distributed system services
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
The official PGP user's guide
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
Resilient Authentication Using Path Independence
IEEE Transactions on Computers
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Associating Metrics to Certification Paths
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
On Inter-RealmAuthentication in Large Distributed Systems
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Limitations on Design Principles for Public Key Protocols
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Automated cross-organisational trust establishment on extranets
ITVE '01 Proceedings of the workshop on Information technology for virtual enterprises
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Trust Management and Whether to Delegate
Revised Papers from the 9th International Workshop on Security Protocols
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Establishing the business value of network security using analytical hierarchy process
Creating business value with information technology
Robust incentive techniques for peer-to-peer networks
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Efficient, Self-Contained Handling of Identity in Peer-to-Peer Systems
IEEE Transactions on Knowledge and Data Engineering
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
How to incorporate revocation status information into the trust metrics for public-key certification
Proceedings of the 2005 ACM symposium on Applied computing
Toward measuring network security using attack graphs
Proceedings of the 2007 ACM workshop on Quality of protection
Vulnerability analysis of certificate graphs
International Journal of Security and Networks
Network service sharing infrastructure: service authentication and authorization revocation
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures
Journal of Computer Security
Risk management for distributed authorization
Journal of Computer Security
An Attack Graph-Based Probabilistic Security Metric
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Measuring network security using dynamic bayesian network
Proceedings of the 4th ACM workshop on Quality of protection
Requirements of federated trust management for service-oriented architectures
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Towards a precise semantics for authenticity and trust
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
A calculus of trust and its application to PKI and identity management
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Dynamics, Robustness and Fragility of Trust
Formal Aspects in Security and Trust
Efficient Information Propagation in Service Routing for Next Generation Network
RSKT '09 Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology
Evidence processing and privacy issues in evidence-based reputation systems
Computer Standards & Interfaces
Towards a trustworthy short-range mobile payment system
International Journal of Information Technology and Management
Using probabilistic argumentation for key validation in public-key cryptography
International Journal of Approximate Reasoning
A process-oriented model for authentication on the basis of a coloured Petri net
BPM'03 Proceedings of the 2003 international conference on Business process management
Measuring the overall security of network configurations using attack graphs
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
FaceTrust: assessing the credibility of online personas via social networks
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
k-zero day safety: measuring the security risk of networks against unknown attacks
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Quantifying and qualifying trust: spectral decomposition of trust networks
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
Incentivizing responsible networking via introduction-based routing
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Collusion in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Aggregating trust using triangular norms in the keynote trust management system
STM'10 Proceedings of the 6th international conference on Security and trust management
An authentication trust metric for federated identity management systems
STM'10 Proceedings of the 6th international conference on Security and trust management
Trust metrics for the SPKI/SDSI authorisation framework
ATVA'11 Proceedings of the 9th international conference on Automated technology for verification and analysis
Implementing credential networks
iTrust'06 Proceedings of the 4th international conference on Trust Management
Use of a validation authority to provide risk management for the PKI relying party
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Leveraging Social Feedback to Verify Online Identity Claims
ACM Transactions on the Web (TWEB)
Hi-index | 0.01 |
Authentication using a path of trusted intermediaries, each able to authenicate the next in the path, is a well-known technique for authenicating entities in a large-scale system. Recent work has extended this technique to include multiple paths in an effort to bolster authentication, but the success of this approach may be unclear in the face of intersecting paths, ambiguities in the meaning of certificates, and interdependencies in the use of different keys. Thus, several authors have proposed metrics to evaluate the confidence afforded by a set of paths. In this paper we develop a set of guiding principles for the design of such metrics. We motivate our principles by showing how previous approaches failed with respect to these principles and what the consequences to authentication might be. We then propose a new metric that appears to meet our principles, and so to be a satisfactory metric of authenticaiton.